article thumbnail

Phishers Target Aviation Execs to Scam Customers

Krebs on Security

They said the attackers had spun up a look-alike domain just a few hours after the executive’s inbox credentials were phished, and that the scam resulted in a customer suffering a six-figure financial loss. However, BEC scams were the second most costly form of cybercrime reported to the feds last year, with nearly $2.8

article thumbnail

5 riskiest places to get scammed online

Malwarebytes

But, according to new research from Malwarebytes , while scammers can reach people through just about any modern method of communication, they have at least five favored tracts for finding new victims—emails, phone calls and voicemails, malicious websites, social media platforms, and text messages.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report on the Malicious Uses of AI

Schneier on Security

By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and expose abusive activity including social engineering, cyber espionage, deceptive employment schemes, covert influence operations and scams.

article thumbnail

“Urgent reminder” tax scam wants to phish your Microsoft credentials

Malwarebytes

But that’s just one example of a tax scam. The IRS’s annual Dirty Dozen list of tax scams shows common schemes that threaten your tax and financial information. And, although these scams do appear year-round, tax season is when they reach their peak level.

article thumbnail

Deceptive Google Meet Invites Lures Users Into Malware Scams

eSecurity Planet

These malware scams lure individuals with fake conference invitations designed to mimic legitimate meeting requests and exploit users’ trust. Cybercriminals employ social engineering techniques to trick you into believing you must resolve fictitious technical issues.

article thumbnail

Social Engineering: Back to the Basics

Security Through Education

When I first heard of social engineering, about 6 years ago, I couldnt define it clearly and concisely if you had offered me millions of dollars. ’ Lets re-visit what social engineering really means, how people use it, and how you can start protecting yourself from it. Either way, lets refresh and learn together!

article thumbnail

As Seen on Channel 5’s Vanessa (Feltz) Show: What to Do if You’re Targeted by a Scam

Jane Frankland

After joining Vanessa Feltz on Channel 5 to talk all things scams, I wanted to follow up with a clear guide for anyone whos ever been targeted or worries they might be next. Scams today arent just dodgy emails or shady phone calls. billion is lost to scams every year in the UK, with an average loss of 1,443 per person.